Abstract – In world, main communication media is

advertisement
Overcome of Router/ Gateway Problems in Wireless Networks
Homer Benny1, Chodagam Suresh Kumar2, Donavalli Venkata Vidya Deepthi3,
Sala Krishna Rao4 & G Samuel Vara Prasad Raju5
1&3
Computer Science and Engineering Department, Sir C R R College of Engineering, Eluru
Computer Science and Engineering Department, Anurag Engineering College, Kodad
4
Information and Technology Department, Sir C R R College of Engineering,
5
CSSE Department, Andhra Univeristy, Visakhapatnam
E-mail : Homer.benny@gmail.com1, chsuresh_kmr@yahoo.co.in2, deepthidonavalli@yahoo.com3,
skrao71@gmail.com4, gsvprajudr9@yahoo.co.in5
2
data, communications protocol used, scale, topology,
benefit, and organizational scope.
Abstract – In world, main communication media is
Networks. A computer network, or simply a network, is a
collection of computers and other hardware interconnected
by communication channels that allow sharing of resources
and information. Where we can setup communication in
between a small office, offices, towns, cities and any
geographic place in world. Fast way of communicating is
by Networks. Even tough we are using sophisticated
devices to achieve target goal but there are some minor
problems which are under finger tip. Under magnified
glass there are big and irritating. In this paper we will
study about Computer Networks, problems related to
router and solutions related to router. These days, having
access to wireless broadband is an absolute necessity for
home offices and small businesses. And after more than a
decade of innovations, you would think that the standard
wireless gateway/router would be a picture-perfect product
by now. While many routers offer good features, most still
come with flaws that can make life a lot harder, such as
confounding setups or limited security. In paper we follow
some problems and suggest some solutions to the problems.
Communications protocols define the rules and data
formats for exchanging information in a computer
network, and provide the basis for network
programming. Well-known communications protocols
include two Ethernet, a hardware and link layer standard
that is ubiquitous in local area networks, and the Internet
protocol suite, which defines a set of protocols for
internetworking, i.e. for data communication between
multiple networks, as well as host-to-host data transfer,
and application-specific data transmission formats.
Computer networking is sometimes considered a
sub-discipline
of
electrical
engineering,
telecommunications, computer science, information
technology or computer engineering, since it relies upon
the theoretical and practical application of these
disciplines.
II. PROPERTIES OF COMPUTER NETWORKS
I.
INTRODUCTION
Facilitate communications
A computer network, or simply a network, is a
collection of computers and other hardware
interconnected by communication channels that allow
sharing of resources and information. Where at least one
process in one device is able to send/receive data
to/from at least one process residing in a remote device,
then the two devices are said to be in a network. A
network is a group of devices connected to each other.
Networks may be classified into a wide variety of
characteristics, such as the medium used to transport the
Using a network, people can communicate
efficiently and easily via email, instant messaging, chat
rooms, telephone, video telephone calls, and video
conferencing.
Permit sharing of files, data, and other types of
information
In a network environment, authorized users may
access data and information stored on other computers
on the network. The capability of providing access to
ISSN (Print) : 2319 – 2526, Volume-2, Issue-5, 2013
66
International Journal on Advanced Computer Theory and Engineering (IJACTE)
data and information on shared storage devices is an
important feature of many networks.
copper cabling that can be utilized for both voice and
data transmission. The use of two wires twisted together
helps to reduce crosstalk and electromagnetic induction.
Share network and computing resources
The transmission speed ranges from 2 million bits
per second to 10 billion bits per second. Twisted pair
cabling comes in two forms: unshielded twisted pair
(UTP) and shielded twisted-pair (STP). Each form
comes in several category ratings, designed for use in
various scenarios.
In a networked environment, each computer on a
network may access and use resources provided by
devices on the network, such as printing a document on
a shared network printer. Distributed computing uses
computing resources across a network to accomplish
tasks.
Coaxial cable is widely used for cable television
systems, office buildings, and other work-sites for local
area networks. The cables consist of copper or
aluminum wire surrounded by an insulating layer
(typically a flexible material with a high dielectric
constant), which itself is surrounded by a conductive
layer. The insulation helps minimize interference and
distortion. Transmission speed ranges from 200 million
bits per second to more than 500 million bits per second.
May be insecure
A computer network may be used by computer
hackers to deploy computer viruses or computer worms
on devices connected to the network, or to prevent these
devices from normally accessing the network (denial of
service).
May interfere with other technologies
Power line communication strongly disturbs certain
forms of radio communication, e.g., amateur radio. It
may also interfere with last mile access technologies
such as ADSL and VDSL.
ITU-T G.hn technology uses existing home wiring
(coaxial cable, phone lines and power lines) to create a
high-speed (up to 1 Gigabit/s) local area network.
An optical fiber is a glass fiber. It uses pulses of
light to transmit data. Some advantages of optical fibers
over metal wires are less transmission loss, immunity
from electromagnetic radiation, and very fast
transmission speed, up to trillions of bits per second.
One can use different colors of lights to increase the
number of messages being sent over a fiber optic cable.
May be difficult to set up
A complex computer network may be difficult to
set up. It may also be very costly to set up an effective
computer network in a large organization or company.
III. COMMUNICATION MEDIA
Computer networks can be classified according to
the hardware and associated software technology that is
used to interconnect the individual devices in the
network, such as electrical cable (HomePNA, power line
communication, G.hn), optical fiber, and radio waves
(wireless LAN). In the OSI model, these are located at
levels 1 and 2.
Wireless technologies
Terrestrial microwave – Terrestrial microwave
communication uses Earth-based transmitters and
receivers resembling satellite dishes. Terrestrial
microwaves are in the low-gigahertz range, which limits
all communications to line-of-sight. Relay stations are
spaced approximately 48 km (30 mi) apart.
A well-known family of communication media is
collectively known as Ethernet. It is defined by IEEE
802 and utilizes various standards and media that enable
communication between devices. Wireless LAN
technology is designed to connect devices without
wiring. These devices use radio waves or infrared
signals as a transmission medium.
Communications
satellites –
The
satellites
communicate via microwave radio waves, which are not
deflected by the Earth's atmosphere. The satellites are
stationed in space, typically in geosynchronous orbit
35,400 km (22,000 mi) above the equator. These Earthorbiting systems are capable of receiving and relaying
voice, data, and TV signals.
Wired technologies
Cellular and PCS systems use several radio
communications technologies. The systems divide the
region covered into multiple geographic areas. Each
area has a low-power transmitter or radio relay antenna
device to relay calls from one area to the next area.
The order of the following wired technologies is,
roughly, from slowest to fastest transmission speed.
Twisted pair wire is the most widely used medium for
telecommunication. Twisted-pair cabling consist of
copper wires that are twisted into pairs. Ordinary
telephone wires consist of two insulated copper wires
twisted into pairs. Computer networking cabling (wired
Ethernet as defined by IEEE 802.3) consists of 4 pairs of
Radio and spread spectrum technologies – Wireless
local area network use a high-frequency radio
ISSN (Print) : 2319 – 2526, Volume-2, Issue-5, 2013
67
International Journal on Advanced Computer Theory and Engineering (IJACTE)
technology similar to digital cellular and a lowfrequency radio technology. Wireless LANs use spread
spectrum technology to enable communication between
multiple devices in a limited area. IEEE 802.11 defines
a common flavor of open-standards wireless radio-wave
technology.
The standards include ISO/IEC 18092 and those defined
by the NFC Forum, which was founded in 2004 by
Nokia, Philips and Sony, and now has more than 160
members. The Forum also promotes NFC and certifies
device compliance.
Infrared communication can transmit signals for
small distances, typically no more than 10 meters. In
most cases, line-of-sight propagation is used, which
limits the physical positioning of communicating
devices.
A global area network (GAN) is a network used for
supporting mobile across an arbitrary number of
wireless LANs, satellite coverage areas, etc. The key
challenge in mobile communications is handing off user
communications from one local coverage area to the
next. In IEEE Project 802, this involves a succession of
terrestrial wireless LANs.
IV. SCALE OF NETWORKS
Fig. 1 : NFC.
Computer Network types by geographical scope
1.
NFC
2.
Body (BAN)
3.
Personal (PAN)
4.
Near-me (NAN)
5.
Local (LAN)
1.
Home (HAN)
2.
Storage (SAN)
6.
Campus (CAN)
7.
Backbone
8.
Metropolitan
9.
Wide
2. Body Area Network - Body area network (BAN),
wireless body area network (WBAN) or body sensor
network (BSN) are terms used to describe the
application of wearable computing devices. This will
enable wireless communication between several
miniaturized body sensor units (BSU) and a single body
central unit (BCU) worn at the human body. The
development of WBAN technology started around 1995
by considering wireless personal area network (WPAN)
technologies for communications on, near and around
the human body. Later around 2001, this application of
WPAN has been named as body area network (BAN) to
represent the communications on, in and near the body
only. A WBAN system can use WPAN wireless
technologies as gateways to reach longer ranges.
10. Internet
3. Personal Area Network - A personal area network
(PAN) is a computer network used for communication
among computer and different information technological
devices close to one person. Some examples of devices
that are used in a PAN are personal computers, printers,
fax machines, telephones, PDAs, scanners, and even
video game consoles. A PAN may include wired and
wireless devices. The reach of a PAN typically extends
to 10 meters. A wired PAN is usually constructed with
USB and Firewire connections while technologies such
as Bluetooth and infrared communication typically form
a wireless PAN.
11. Interplanetary Internet
1. Near Field Communication - Near field
communication
(NFC) is a set of standards for
smartphones and similar
devices to establish radio
communication with each other by touching them
together or bringing them into close proximity, usually
no more than a few centimeters. Present and anticipated
applications include contactless transactions, data
exchange, and simplified setup of more complex
communications such as Wi-Fi. Communication is also
possible between an NFC device and an unpowered
NFC chip, called a "tag". NFC standards cover
communications protocols and data exchange formats,
and are based on existing radio-frequency identification
(RFID) standards including ISO/IEC 14443 and FeliCa.
4. Local Area Network – A local area network (LAN)
is a network that connects computers and devices in a
limited geographical area such as home, school,
computer laboratory, office building, or closely
ISSN (Print) : 2319 – 2526, Volume-2, Issue-5, 2013
68
International Journal on Advanced Computer Theory and Engineering (IJACTE)
positioned group of buildings. Each computer or device
on the network is a node. Current wired LANs are most
likely to be based on Ethernet technology, although new
standards like ITU-T G.hn also provide a way to create a
wired LAN using existing home wires (coaxial cables,
phone lines and power lines).
primarily used to make storage devices, such as disk
arrays, tape libraries, and optical jukeboxes, accessible
to servers so that the devices appear like locally attached
devices to the operating system. A SAN typically has its
own network of storage devices that are generally not
accessible through the local area network by other
devices. The cost and complexity of SANs dropped in
the early 2000s to levels allowing wider adoption across
both enterprise and small to medium sized business
environments.
7. Campus Area Network – A campus area network
(CAN) is a computer network made up of an
interconnection of LANs within a limited geographical
area. The networking equipment (switches, routers) and
transmission media (optical fiber, copper plant, Cat5
cabling etc.) are almost entirely owned (by the campus
tenant / owner: an enterprise, university, government
etc.).
In the case of a university campus-based campus
network, the network is likely to link a variety of
campus buildings including, for example, academic
colleges or departments, the university library, and
student residence halls.
Fig. 2 : Typical library network, in a branching tree
topology and controlled access to resources.
A sample LAN is depicted in the accompanying
diagram. All interconnected devices must understand the
network layer (layer 3), because they are handling
multiple subnets (the different colors). Those inside the
library, which have only 10/100 Mbit/s Ethernet
connections to the user device and a Gigabit Ethernet
connection to the central router, could be called "layer 3
switches" because they only have Ethernet interfaces
and must understand IP. It would be more correct to call
them access routers, where the router at the top is a
distribution router that connects to the Internet and
academic networks' customer access routers.
8. Backbone Network – A backbone network is part of
a computer network infrastructure that interconnects
various pieces of network, providing a path for the
exchange of information between different LANs or
subnetworks. A backbone can tie together diverse
networks in the same building, in different buildings in a
campus environment, or over wide areas. Normally, the
backbone's capacity is greater than that of the networks
connected to it.
A large corporation which has many locations may
have a backbone network that ties all of these locations
together, for example, if a server cluster needs to be
accessed by different departments of a company which
are located at different geographical locations. The
equipment which ties these departments together
constitute the network backbone. Network performance
management including network congestion are critical
parameters taken into account when designing a network
backbone.
The defining characteristics of LANs, in contrast to
WANs (Wide Area Networks), include their higher data
transfer rates, smaller geographic range, and no need for
leased telecommunication lines. Current Ethernet or
other IEEE 802.3 LAN technologies operate at data
transfer rates up to 10 Gbit/s. IEEE has projects
investigating the standardization of 40 and 100 Gbit/s.
LANs can be connected to Wide area network by using
routers.
5. Home Area Network - A home area network (HAN)
is a residential LAN which is used for communication
between digital devices typically deployed in the home,
usually a small number of personal computers and
accessories, such as printers and mobile computing
devices. An important function is the sharing of Internet
access, often a broadband service through a cable TV or
Digital Subscriber Line (DSL) provider.
A specific case of a backbone network is the
Internet backbone, which is the set of wide-area network
connections and core routers that interconnect all
networks connected to the Internet.
9. Metropolitan Network – A Metropolitan area
network (MAN) is a large computer network that
usually spans a city or a large campus.
10. Wide Area Network – A wide area network (WAN)
is a computer network that covers a large geographic
area such as a city, country, or spans even
6. Storage Area Network - A storage area network
(SAN) is a dedicated network that provides access to
consolidated, block level data storage. SANs are
ISSN (Print) : 2319 – 2526, Volume-2, Issue-5, 2013
69
International Journal on Advanced Computer Theory and Engineering (IJACTE)
intercontinental distances, using a communications
channel that combines many types of media such as
telephone lines, cables, and air waves. A WAN often
uses transmission facilities provided by common
carriers, such as telephone companies. WAN
technologies generally function at the lower three layers
of the OSI reference model: the physical layer, the data
link layer, and the network layer.
overlay are connected by virtual or logical links, each of
which corresponds to a path, perhaps through many
physical links, in the underlying network. The topology
of the overlay network may (and often does) differ from
that of the underlying one.
For example, many peer-to-peer networks are
overlay networks because they are organized as nodes of
a virtual system of links run on top of the Internet. The
Internet was initially built as an overlay on the telephone
network.
11. Internetwork – An internetwork is the connection of
multiple computer networks via a common routing
technology using routers. The Internet is an aggregation
of many connected internetworks spanning the Earth.
The most striking example of an overlay network,
however, is the Internet itself: At the IP layer, each node
can reach any other by a direct connection to the desired
IP address, thereby creating a fully connected network;
the underlying network, however, is composed of a
mesh-like interconnect of subnetworks of varying
topologies (and, in fact, technologies). Address
resolution and routing are the means which allows the
mapping of the fully connected IP overlay network to
the underlying ones.
V. NETWORK TOPOLOGY
1) Common layouts
A network topology is the layout of the
interconnections of the nodes of a computer network.
Common layouts are:

A bus network: all nodes are connected to a
common medium along this medium. This was the
layout used in the original Ethernet, called
10BASE5 and 10BASE2.

A star network: all nodes are connected to a special
central node. This is the typical layout found in a
Wireless LAN, where each wireless client connects
to the central Wireless access point.

A ring network: each node is connected to its left
and right neighbour node, such that all nodes are
connected and that each node can reach each other
node by traversing nodes left- or rightwards. The
Fiber Distributed Data Interface (FDDI) made use
of such a topology.

A mesh network: each node is connected to an
arbitrary number of neighbours in such a way that
there is at least one traversal from any node to any
other.
Overlay networks have been around since the
invention of networking when computer systems were
connected over telephone lines using modems, before
any data network existed as shown Fig. 3.
A fully connected network: each node is connected
to every other node in the network.
Note that the physical layout of the nodes in a
network may not necessarily reflect the network
topology. As an example, with FDDI, the network
topology is a ring (actually two counter-rotating rings),
but the physical topology is a star, because all
neighboring connections are routed via a central
physical location.
Fig. 3 : A sample overlay network: IP over SONET over
optical.
Another example of an overlay network is a
distributed hash table, which maps keys to nodes in the
network. In this case, the underlying network is an IP
network, and the overlay network is a table (actually a
map) indexed by keys.
Overlay networks have also been proposed as a way
to improve Internet routing, such as through quality of
service guarantees to achieve higher-quality streaming
media. Previous proposals such as IntServ, DiffServ,
Overlay network
An overlay network is a virtual computer network
that is built on top of another network. Nodes in the
ISSN (Print) : 2319 – 2526, Volume-2, Issue-5, 2013
70
International Journal on Advanced Computer Theory and Engineering (IJACTE)
and IP Multicast have not seen wide acceptance largely
because they require modification of all routers in the
network. On the other hand, an overlay network can be
incrementally deployed on end-hosts running the
overlay protocol software, without cooperation from
Internet service providers. The overlay has no control
over how packets are routed in the underlying network
between two overlay nodes, but it can control, for
example, the sequence of overlay nodes a message
traverses before reaching its destination.
small amount of time to regenerate the signal. This can
cause a propagation delay which can affect network
communication when there are several repeaters in a
row. Many network architectures limit the number of
repeaters that can be used in a row (e.g. Ethernet's 5-4-3
rule).
Bridges
A network bridge connects multiple network
segments at the data link layer (layer 2) of the OSI
model. Bridges broadcast to all ports except the port on
which the broadcast was received. However, bridges do
not promiscuously copy traffic to all ports, as hubs do,
but learn which MAC addresses are reachable through
specific ports. Once the bridge associates a port and an
address, it will send traffic for that address to that port
only.
For example, Akamai Technologies manages an
overlay network that provides reliable, efficient content
delivery (a kind of multicast). Academic research
includes end system multicast and overcast for
multicast; RON (resilient overlay network) for resilient
routing; and OverQoS for quality of service guarantees,
among others.
Bridges learn the association of ports and addresses
by examining the source address of frames that it sees
on various ports. Once a frame arrives through a port, its
source address is stored and the bridge assumes that
MAC address is associated with that port. The first time
that a previously unknown destination address is seen,
the bridge will forward the frame to all ports other than
the one on which the frame arrived.
VI. BASIC HARDWARE COMPONENTS
Apart from the physical communications media
themselves as described above, networks comprise
additional
basic
hardware
building
blocks
interconnecting their terminals, such as network
interface cards (NICs), hubs, bridges, switches, and
routers.
Network interface cards
Bridges come in three basic types:
A network card, network adapter, or NIC (network
interface card) is a piece of computer hardware designed
to allow computers to physically access a networking
medium. It provides a low-level addressing system
through the use of MAC addresses.
Each Ethernet network interface has a unique MAC
address which is usually stored in a small memory
device on the card, allowing any device to connect to the
network without creating an address conflict. Ethernet
MAC addresses are composed of six octets. Uniqueness
is maintained by the IEEE, which manages the Ethernet
address space by assigning 3-octet prefixes to equipment
manufacturers. The list of prefixes is publicly available.
Each manufacturer is then obliged to both use only their
assigned prefix(es) and to uniquely set the 3-octet suffix
of every Ethernet interface they produce.

Local bridges: Directly connect LANs

Remote bridges: Can be used to create a wide area
network (WAN) link between LANs. Remote
bridges, where the connecting link is slower than
the end networks, largely have been replaced with
routers.

Wireless bridges: Can be used to join LANs or
connect remote stations to LANs.
Switches
A network switch is a device that forwards and
filters OSI layer 2 datagrams (chunks of data
communication) between ports (connected cables) based
on the MAC addresses in the packets. A switch is
distinct from a hub in that it only forwards the frames to
the ports involved in the communication rather than all
ports connected. A switch breaks the collision domain
but represents itself as a broadcast domain. Switches
make forwarding decisions of frames on the basis of
MAC addresses. A switch normally has numerous ports,
facilitating a star topology for devices, and cascading
additional switches. Some switches are capable of
routing based on Layer 3 addressing or additional
logical levels; these are called multi-layer switches. The
term switch is used loosely in marketing to encompass
Repeaters and hubs
A repeater is an electronic device that receives a
signal, cleans it of unnecessary noise, regenerates it, and
retransmits it at a higher power level, or to the other side
of an obstruction, so that the signal can cover longer
distances without degradation. In most twisted pair
Ethernet configurations, repeaters are required for cable
that runs longer than 100 meters. A repeater with
multiple ports is known as a hub. Repeaters work on the
Physical Layer of the OSI model. Repeaters require a
ISSN (Print) : 2319 – 2526, Volume-2, Issue-5, 2013
71
International Journal on Advanced Computer Theory and Engineering (IJACTE)
devices including routers and bridges, as well as devices
that may distribute traffic on load or by application
content (e.g., a Web URL identifier).
router to another through the networks that constitute
the internetwork until it gets to its destination node.
The most familiar type of routers are home and
small office routers that simply pass data, such as web
pages and email, between the home computers and the
owner's cable or DSL modem, which connects to the
Internet through an ISP. More sophisticated routers,
such as enterprise routers, connect large business or ISP
networks up to the powerful core routers that forward
data at high speed along the optical fiber lines of the
Internet backbone. Though routers are typically
dedicated hardware devices, use of software-based
routers has grown increasingly common.
Routers
A router is an internetworking device that forwards
packets between networks by processing information
found in the datagram or packet (Internet protocol
information from Layer 3 of the OSI Model). In many
situations, this information is processed in conjunction
with the routing table (also known as forwarding table).
Routers use routing tables to determine what interface to
forward packets (this can include the "null" also known
as the "black hole" interface because data can go into it,
however, no further processing is done for said data).
A. Problems List
Firewalls
These days, having access to wireless broadband is
an absolute necessity for home offices and small
businesses. And after more than a decade of
innovations, you would think that the standard wireless
gateway/router would be a picture-perfect product by
now. Alas, no.
A firewall is an important aspect of a network with
respect to security. It typically rejects access requests
from unsafe sources while allowing actions from
recognized ones. The vital role firewalls play in network
security grows in parallel with the constant increase in
'cyber' attacks for the purpose of stealing/corrupting
data, planting viruses, etc.
While many routers offer good features, most still
come with flaws that can make life a lot harder, such as
confounding setups or limited security.
VII. PROBLEMS AT ROUTER
What follows are six router problems that, quite
frankly, I find the most annoying. I looked for possible
solutions, and while I didn't find one router that
addressed all my concerns, I did discover features -- and
routers -- that could make things a lot easier.
A router is a device that forwards data packets
between computer networks, creating an overlay
internetwork. A router is connected to two or more data
lines from different networks. Fig. 4 is Cisco Router
ASM/2 – 32EM deployed at CERN (European
Organization for Nuclear Research).
1.
Difficult configuration
The problem: How long does it usually take you to
set up your router? When was the last time you were
able to get it right on the first try? What about when you
wanted to add a new PC to your wireless network? And
how about getting your wireless printer to connect to
your network?
2.
Enabling file sharing from your router
The problem: Why spend money on a separate
network-attached storage (NAS) unit when you can use
your router for sharing files? Many routers come with
USB ports to which you can connect an external USB
drive for simple backup or file sharing.
Fig. 4: Cisco Router ASM/2 – 32EM deployed at CERN
3.
When a data packet comes in one of the lines, the
router reads the address information in the packet to
determine its ultimate destination. Then, using
information in its routing table or routing policy, it
directs the packet to the next network on its journey.
Routers perform the "traffic directing" functions on the
Internet. A data packet is typically forwarded from one
Performing firmware updates
The problem: Router firmware is an important first
line of security defense on your network and needs to be
kept up to date. But finding firmware updates on a
vendor's Web site is not for everyone, and many
vendors don't make it easy. You have to bring up your
browser, go to the vendor's support site and try to track
down the current version for your particular router
model. You then have to download the file to your PC
ISSN (Print) : 2319 – 2526, Volume-2, Issue-5, 2013
72
International Journal on Advanced Computer Theory and Engineering (IJACTE)
and upload it to your router in the right place in the
router's Web control panel screen.
infected domains. (Your actual performance will vary
widely, depending on your Internet provider and, if you
are using a cable modem, how congested your cable line
is).
To complicate matters, vendors often have several
different versions for each router model, because they
make frequent improvements to the router, often
changing chip sets but keeping the version number the
same.
4.
VIII. SOLUTION TO PROBLEMS
1.
Various vendors have tried to make things simpler
with easy-setup CDs or one-click connection buttons,
but they can't cover every possible circumstance.
Buffalo's and Netgear's setup instructions go the extra
mile by explicitly detailing the order in which you need
to you plug everything in before you run the CD. (Cable
modems in particular should be powered on before you
connect your router to them.) That's a nice touch -- but it
assumes you've read the printed instructions that came
with the router. When was the last time you read the
manual before you plugged in your new device?
Enabling temporary wireless access
The problem: If you have visitors or needy
neighbors, do you really want them to have permanent
access to your entire network? Even if you trust them on
your network, do you know how good their own
security is? (For example, will your neighbor's notebook
end up in the hands of his teenager?) If you simply give
a visitor your router password, then you probably need
to change this information when he leaves your home or
office -- which is a real pain.
5.
Possible solutions:
Determining who is on your wireless network
Almost all routers have Web-based configuration
screens, and as long as you remember the device's IP
address, default username and password (which you
should have changed when you set it up), you should be
able to get into the setup screens and make any
adjustments you need. It's just a matter of figuring out
which adjustments are necessary.
The problem: Just because you think your network
is secure doesn't mean that it is. It's probably a good idea
to regularly check to see who is using your router -especially if you haven't changed your router's default
password. However, in a world where it's hard enough
to remember to back up your computer, it's unlikely that
most of us have the time or inclination to regularly
check who has been on our networks.
Best available routers: The Cisco Valet M10, part
of Cisco's recently introduced Valet line, comes with a
USB key that has the configuration software on it. Once
you set up one PC on your network, you use the key to
run the configuration on any other PCs or Macs (the key
also includes Mac software) without having to write
down the wireless encryption key or other information.
And even if we want to, it's not always easy.
Typically, most router Web UIs indicate who is
currently connected, but finding this out requires
digging through many menus. Sometimes the vendors
hide this information under a title like "DHCP client
list" and/or give you just the IP addresses and host
names of current connections.
Wouldn't it be helpful if your router notified you
every time someone connected? Even better, how about
a historical view that shows you when and who
connected to your network over the last week?
6.
Changing your DNS provider
The problem: After you've set up your network, you
probably don't give your Domain Name System settings
any further thought. If you have a cable or DSL modem,
you hook it up and it automatically gets its DNS settings
from the cable or phone company's DNS servers. (If
you're running a large enterprise network, typically you
have your own internal DNS server to provide this
service.)
Fig. 5. : Cisco’s Valet offers a simple setup for
connecting a wireless printer.
Home and small-business users may want to look
into finding an alternative DNS provider. Why bother?
Two good reasons: better browsing performance and
better security against known phishing and malware-
Cisco has also made it a lot easier to set up other
devices, such as wireless printers, by providing a
summary screen with all the relevant information about
ISSN (Print) : 2319 – 2526, Volume-2, Issue-5, 2013
73
International Journal on Advanced Computer Theory and Engineering (IJACTE)
your wireless network that you can print out for easy
reference when you run the setup program on the USB
key.
also offers a wide variety of access methods, including
FTP and Web sharing, from its setup screen.
3.
Buffalo has a nice diagnostic routine that checks to
see if you have Internet connectivity and that your router
is configured properly. You run it from the Web
configuration console.
Make the update automatic or at least easily
selectable, so you don't have to go through the tortured
process of downloading and uploading the file.
Check the firmware update section in each router's
Web setup screens to see if the router can automatically
upgrade itself.
Apple's AirPort Express is simple to set up and has
some neat features, including the ability to share USB
printers and to share audio across the network to a
connected stereo receiver. You can also extend the range
of your existing AirPort base station, which is
something that most Wi-Fi routers can't easily do. But if
you've got a Windows PC, you've got to install Bonjour,
and adding a new PC to an existing network isn't as easy
as it could be.
2.
Possible solutions:
Best available routers: Belkin's N+ Wireless and
Netgear's RangeMax both have a menu-selectable
software switch to enable the updates. Once this is set,
you can forget about it and be confident that you will
always have the latest firmware.
Possible solutions:
Various routers include USB ports, such as those
from Linksys, Belkin and Netgear.
It's all a matter of what software is used to
configure the USB drive and whether you need anything
else on the Windows or Mac client end to connect to the
shared drive.
Fig. 7: Belkin’s N+ Wireless.
4.
Possible solutions
Best available routers: The Belkin N+ Wireless
Router has a separate software configuration utility that
works for both Windows and Mac systems and needs to
be run only once to set up the external shared drive.
After that, you can connect to the shared drive by
entering its IP address, such as \\192.168.1.1\sharename.
The product isn't perfect, though: There is no way to
password-protect the files on the shared drive.
A good idea would be to grant them temporary
guest access that gives them just an Internet connection
and nothing else on your network, such as shared drives
or printers.
Fig. 6 : Netgear’s USB.
Fig. 8 : Cisco’s Valet provides separate wireless
network for guests.
Vendors have begun to enable this on their routers
in a variety of ways. Belkin, for example, has an option
it calls "Hotel-style," meaning that users are directed to
a Web landing page where they enter a special guest
password. Other vendors make it easy to set up separate
wireless networks just for guests. (If you use Apple's
AirPort Express, on the other hand, you're out of luck -there isn't any guest access.)
The Netgear RangeMax doesn't require any
additional software and can password-protect the files. It
ISSN (Print) : 2319 – 2526, Volume-2, Issue-5, 2013
74
International Journal on Advanced Computer Theory and Engineering (IJACTE)
Best available routers: The USB key that you can create
with Cisco's Valet can help here as well. You need to
run an automated setup routine from the USB key
(rather than from the Web UI) on each of your guest
computers. Once you do, it will set up a separate
wireless network with a different name and password
that only allows Internet access.
Home Portal 3000 series that comes when you order
service from AT&T U-verse, don't even support
alternative DNS settings. Making matters more difficult,
most of the automated setup routines that routers include
don't allow you to enter your own DNS provider.
So if you've decided to go with an alternative, first
make sure your router supports alternative DNS settings.
If you're not sure, see if you can enter your own DNS
address on your router's Web-based setup screens
instead of just using what your Internet provider gives
you.
5. Possible solutions:
There are lots of enterprise-class wireless monitoring
tools, such as AirMagnet, but, price-wise, these are
typically out of the reach of home and SMB users.
Then try it out, including installing its software to
optimize your individual PC, before messing with any of
your router's settings. After you make the change to
your DNS, there is a Java tool that can test your speed to
see if it makes a difference. Depending on how you're
connected to your Internet provider, it can help either a
lot or not much at all. If it doesn't help, consider going
back to your original settings.
Check out the screens that are usually labeled
"Attached devices" or "DHCP client list" to see who is
connected and using which IP addresses. Some
companies, such as Buffalo, clearly show how various
clients have connected and what wireless devices they
are using.
Best available routers: When Cisco bought the company
Pure Networks, it acquired a piece of software called
Network Magic. The Windows version of Network
Magic will show you a pretty map along with a more
useful network histogram timeline revealing who has
connected when.
Fig. 10 : Belkin’s Router.
Best available routers: Most of the router vendors
allow you to enter this information. If yours doesn't -well, either change your vendor or just live with the
DNS provider you're given.
IX. CONCLUSION
A router is a device that forwards data packets
between computer networks, creating an overlay
internetwork. A router is connected to two or more data
lines from different networks and backbones. When a
data packet comes in one of the lines, the router reads
the address information in the packet to determine its
ultimate destination. Then, using information in its
routing table or routing policy, it directs the packet to
the next network on its journey. Routers perform the
"traffic directing" functions on the Internet. A data
packet is typically forwarded from one router to another
through the networks that constitute the internetwork
until it gets to its destination node. In this paper we
identified some problems related to Router/ gateway.
Our suggestions are not final solutions to the problem.
But they satisfy to some extend.
Fig. 9: Network Magic timeline for Network.
For some reason, Cisco includes this software in
some of its Linksys routers but not the Valet M10 series.
(The Mac version doesn't have the maps or histograms.)
6.
Possible solutions:
Individuals and smaller businesses now have
several alternative providers that are worth considering,
including OpenDNS and Google Public DNS, among
others.
Getting your router vendor to support these servers
is sometimes tricky. A few routers, such as 2Wire's
ISSN (Print) : 2319 – 2526, Volume-2, Issue-5, 2013
75
International Journal on Advanced Computer Theory and Engineering (IJACTE)
X. REFERENCES
[1]
[2]
Efficient Security Mechanisms for Routing
Protocols by Yih-Chun Hu, Adrian Perrig, David
B Johnson
A New Approach to Interdomain Routing Based
on Secure Multi-Party Computation by Debayan
Gupta, Aaron Segal, Aurojit Panda, Gil Segev
[3]
Ants-Based Routing in Large Scale Mobile AdHoc Networks by M. Heissenbüttel, T. Braun
[4]
Content-Based Addressing and Routing:A
General Model and its Application by Antonio
Carzaniga, David S. Rosenblum, Alexander L.
Wolf

ISSN (Print) : 2319 – 2526, Volume-2, Issue-5, 2013
76
Download